Creating Your Own Customized Metamorphic Algorithm - Raul Alvarez (Circle City Con 2017 Videos) (Hacking Illustrated Series InfoSec Tutorial Videos)
Creating Your Own Customized Metamorphic Algorithm
Raul Alvarez

raulr_alvarez
Circle City Con 2017

Most malware uses metamorphic code to evade Antivirus detection. These techniques also slow down security researchers when digging deeper into the malware code. On the malware side, there are many ways to generate and implements the said algorithms, yet our ultimate goal is to detect them.

I joined Fortinet in 2004, and is currently working as a Senior Security Researcher/ AV Team Lead. I am also one of the Lead Trainer responsible for training the junior AV/IPS analysts in malware analysis and reverse engineering. I have presented in different conferences like BSidesVancouver, BSidesCapeBreton, OAS-First, BSidesOttawa, SecTor, DefCamp, BCAware, AtlSecCon, and BSidesCalgary. I am a regular contributor to the Fortinet blog and also in the Virus Bulletin publication, where I have published 22 articles.

Back to Circle City Con 2017 Videos list



If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek